HASH-BASED SYSTEMS AND METHODS FOR DETECTING AND PREVENTING TRANSMISSION OF UNWANTED E-MAIL
First Claim
1. A method for detecting transmission of potentially unwanted e-mail messages, comprising:
- receiving a plurality of e-mail messages;
generating hash values, as generated hash values, based on one or more portions of the plurality of e-mail messages;
determining whether the generated hash values match hash values associated with prior e-mail messages; and
determining that one of the plurality of e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the one of the plurality of e-mail messages match one or more of the hash values associated with the prior e-mail messages.
2 Assignments
0 Petitions
Accused Products
Abstract
A system (120) detects transmission of potentially unwanted e-mail messages. The system (120) may receive e-mail messages and generate hash values based on one or more portions of the e-mail messages. The system (120) may then determine whether the generated hash values match hash values associated with prior e-mail messages. The system (120) may determine that one of the e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the e-mail message match one or more of the hash values associated with the prior e-mail messages.
-
Citations
29 Claims
-
1. A method for detecting transmission of potentially unwanted e-mail messages, comprising:
-
receiving a plurality of e-mail messages; generating hash values, as generated hash values, based on one or more portions of the plurality of e-mail messages; determining whether the generated hash values match hash values associated with prior e-mail messages; and determining that one of the plurality of e-mail messages is a potentially unwanted e-mail message when one or more of the generated hash values associated with the one of the plurality of e-mail messages match one or more of the hash values associated with the prior e-mail messages. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification